Why "Two-Person Integrity" (TPI) is Incorrect?
TPI is a security principle requiring two individuals to authorize or perform critical actions (e.g., launching nuclear missiles or handling highly classified information).
It is not relevant or practical for managing user devices in a BYOD environment.
In a Bring Your Own Device (BYOD) environment, organizations must implement security controls to protect data on user devices. Measures like multifactor authentication (MFA), DLP agents, and local encryption help ensure that sensitive data remains secure. However, Two-Person Integrity (TPI) is not a standard or practical control for BYOD.
Why Not the Others?
A. Multifactor Authentication (MFA) → Ensures secure access by requiring multiple factors (e.g., password + biometrics or token) to authenticate users.
B. Data Loss Prevention (DLP) Agents → Prevents unauthorized data transfer or leakage from user devices.
D. Local Encryption → Encrypts sensitive data stored on BYOD devices, protecting it from unauthorized access if the device is lost or stolen.
This section is not available anymore. Please use the main Exam Page.CCSP Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
MaciekMT
1 month, 3 weeks agoMaciekMT
1 month, 3 weeks agoakg001
4 months, 4 weeks ago